Democracy & Rule of Law
Just Security’s expert authors provide analysis on threats and challenges to democracy and the rule of law in the United States and globally. Coverage includes analysis of the separation of powers, good governance, democratic backsliding, authoritarianism, judicial independence, freedom of the press and association, and accountability for rule of law violations.
3,168 Articles
Building Civil Liberties Protections Into the EU’s Latest Border Discussions
European officials are renewing efforts to secure their borders in the wake of last November’s Paris attack. At the end of last month, EU Interior Ministers met to solidify cooperation…
Justice Scalia, Privacy, and Where We Go From Here
When you work in privacy and civil liberties, you get accustomed to having strange bedfellows. Senator Bernie Sanders, Democratic socialist presidential candidate from Vermont,…
FBI’s Push to “Fix a Typo” Would Really Expand Its Surveillance Authority
At last week’s Senate Intelligence Committee hearing on Worldwide Threats, FBI Director James Comey reiterated his call for a major expansion of the FBI’s surveillance authorities,…
Law Enforcement Online: Innovative Doesn’t Mean Illegal
Even the Wild West needed a sheriff. And today’s law enforcement agents, to be effective, need more than a Colt .45 and a gold star. Criminal actors have an increasing ability…
Surveillance Is Still About Power
Since the Snowden revelations in 2013, surveillance has gone from a somewhat arcane term of art used mainly by scholars, spies, and tinfoil hat types, to a household word that…
A New UK-US Data Sharing Agreement: A Tremendous Opportunity, If Done Right
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
The High Standard of Proof in the Encryption Debate
Since the November 13 terrorist attacks in Paris set off another around of debate about exceptional access, a lot of ink has been spilled on the subject of whether or not there…
Questions Congress Should Ask About Section 702
After passing a surveillance reform bill last year, Congress appears poised to turn to examine another controversial surveillance authority — Section 702 of FISA. Using Section…
IBM’s Terrorist-Hunting Software Raises Troubling Questions
Last week, Defense One published an article about a new use that IBM is pioneering for its data-crunching software: identifying potential terrorists in the stream of refugees entering…
Cryptopanic and James Comey’s Xanatos Gambit
For the past year or so I’ve been part of a cybersecurity working group at Harvard’s Berkman Center that on Monday released its first public report, Don’t Panic: Making Progress…
Democracy in Peril in Poland
The collapse of communism in Central and Eastern Europe unleashed one of the most remarkable political transformations of modern times, paving the way for millions of Europeans…
America’s Muddled Approach to Fighting ISIS
Last month, the Los Angeles Times ran a story that helped highlight one facet of the muddled thinking afflicting the US government’s campaign against ISIS: While the military…